UPDATE: #ESETresearch was contacted by one of the possible authors of the Bootkitty bootkit, claiming the bootkit is a part of project created by cybersecurity students participating in Korea's Best of the Best (BoB) training program. 1/2
https://www.welivesecurity.com/en/eset-research/bootkitty-analyzing-first-uefi-bootkit-linux/
Perl interpreter patch to issue runtime warnings against suspicious two-argument open() calls https://www.openwall.com/lists/oss-security/2024/12/04/1
SonicWall security advisory 03 December 2024: SonicWall SMA100 SSL-VPN Affected By Multiple Vulnerabilities
There is no evidence that these vulnerabilities are being exploited in the wild
#sonicwall #sma #sslvpn #vulnerability #CVE #infosec #cybersecurity
Team member @sigabrt describes a fuzzing methodology he used to find a heap overflow in a public @yeswehack bug bounty program for Gnome: https://offsec.almond.consulting/using-aflplusplus-on-bug-bounty-programs-an-example-with-gnome-libsoup.html
Here is a new #NameThatWare challenge.
Please don't just guess into the blue, try to deduct what it is, write down your observations and thoughts.
Hide your answer behind a CW to not spoil it for other participants.
As @daringfireball writes, Google is lying through its corporate teeth about its claims to be encrypting messages.
https://daringfireball.net/linked/2024/12/04/shame-on-google-messages
What a slimy company Google has become, so far distant from its early days when it was so admirable.
‼️ New vulnerabilities have been disclosed in the Veeam Service Provider Console.
CVE-2024-42448 is critical, potentially allowing remote code execution. CVE-2024-42449 is rated high, potentially leaking the NTLM hash of a service account & allowing file deletion.
Learn more and see how to find potentially impacted systems:
I updated the diagram representing the different Point and Print configurations and their exploitation on my blog.
Hopefully, this should provide a better understanding of the whole "PrintNightmare" situation to both defenders and red teamers. 🤞
New blog: Risk talk at JPL
Before Thanksgiving, I was in Southern California, and I was honored to be able to give a talk at the Jet Propulsion Lab. The talk is titled “Threat Modeling: Engineering and Science.” The first part of the talk puts threat modeling in context for engineering secure systems, while the second part considers why we do what we do and asks some questions about how we think about risk.
Cisco security advisory 04 December 2024: Cisco NX-OS Software Image Verification Bypass Vulnerability
CVE-2024-20397 (5.2 medium severity but Cisco wrote high impact) A vulnerability in the bootloader of Cisco NX-OS Software could allow an unauthenticated attacker with physical access to an affected device, or an authenticated, local attacker with administrative credentials, to bypass NX-OS image signature verification. No mention of exploitation/public disclosure.
#cisco #vulnerability #cve #CVE_2024_20397 #cisconxos #infosec #cybersecurity
CISA: CISA Adds One Known Exploited Vulnerability to Catalog
Hot off the press! CVE-2024-51378 (perfect 10.0 critical 🥳 @cR0w) CyberPanel Incorrect Default Permissions Vulnerability
#cyberpanel #CVE #CVE_2024_51378 #cisa #kev #cisakev #knownexploitedvulnerabilitiescatalog #vulnerability #eitw #activeexploitation #infosec #cybersecurity
Unpatched and Exploited Zero-Days: Multiple vulnerabilities in I-O DATA routers UD-LT1 and UD-LT1/EX
Two different sets of researchers reported vulnerabilities in I-O DATA routers to JPCERT/CC.
The developer states that attacks exploiting these vulnerabilities have been observed.
The developer states that the updates addressing these vulnerabilities (CVE-2024-45841, CVE-2024-47133) are planned to be released around December 18, 2024. Too early to speculate and no additional information provided.
cc: @cR0w @mttaggart @ntkramer @dreadpir8robots @neurovagrant @goatyell @metacurity (remember to remove the mentions to avoid ReplyAll madness)
#vulnerability #jpcertcc #cve #IODATA #eitw #activeexploitation #infosec #cybersecurity
Rust 1.83.0 has been released! 🦀✨
This release includes mutable references and pointers in const, references to statics in const, new `ErrorKind`s, and many new const methods on pointers, slices, floats, and more!
Check out the announcement: https://blog.rust-lang.org/2024/11/28/Rust-1.83.0.html
Don't threaten me with a good time, Microsoft.
https://www.theregister.com/2024/12/04/microsoft_update_recall_bug/